Microsoft recently announced some Azure Active Directory improvements, including conditional access policy management enhancements and synchronization service additions.
Security researchers are under attack from a group thought to be associated with North Korea, according to announcements this week by Google and Microsoft.
Microsoft this week described a few security products that have reached "general availability" (GA) or commercial-release status, while also touting its overall security-market position.
Potential phishing attacks were a top concern of most IT security professionals when organizations switched to remote-work conditions early last year.
Microsoft on Wednesday published an analysis of the second-stage "Solorigate" attack methods used by an advanced persistent threat (APT) attack group.
Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.
Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.
Microsoft issued yet another article with advice on how to use its Microsoft 365 Defender suite of tools to protect against "Solorigate" advanced persistent threat types of attacks in a Thursday announcement.
Microsoft on Tuesday notified Windows Server Update Services (WSUS) users that it's no longer going to automatically support "user proxies" to get patches from Microsoft's content delivery networks (CDNs), starting with this month's cumulative update release.
Microsoft released its January security patch bundle on Tuesday, delivering fixes for 83 common vulnerabilities and exposures (CVEs).
Microsoft Defender for Endpoint now has an endpoint detection and response (EDR) capability for use with Linux servers that's deemed ready for use in production environments, Microsoft indicated on Monday.
Security expert Sergey Chubarov on the current security landscape and how the SolarWinds attack can change cybersecurity for the better.
- By Scott Bekker
- 01/11/2021
An advanced persistent threat actor associated with the SolarWinds Orion attacks used their ability to create credentials to compromise a victim's Microsoft 365 and Azure services, but they didn't always tap the so-called "Solorigate" vulnerability to do so.
The U.S. National Security Agency this month published an advisory on detecting and blocking old and insecure Transport Layer Security (TLS) protocol use by organizations.
Microsoft this week announced the commercial release of a feature that simulates phishing attacks, which is now available to certain subscribers to the Microsoft Defender for Office 365 service.
Microsoft is planning to turn on a one-time passcode feature in March that will grant temporary network access to business collaborators for organizations that use the Azure Active Directory B2B service.
Microsoft described security measures for IT pros to consider in the wake of the SolarWinds Orion-based software attack.
To be fair, who could have predicted any of this?
Microsoft this week announced a preview of a user name and password autofill capability in the Microsoft Authenticator app.
The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive this week for federal agencies using SolarWinds Orion management software, which has been compromised in a sophisticated attack.